upload
McAfee, Inc.
Branche: Software
Number of terms: 9143
Number of blossaries: 1
Company Profile:
It is an alternative format to the DOC file type supported by Microsoft Word. RTF files are ASCII text files and include embedded formatting commands. RTF files do not contain macros and cannot be infected with a macro virus. This makes RTF files a good document format for communicating with others via email. However, some macro viruses attempt to intercept saving a file as an RTF file and instead save it as a DOC file with an RTF extension. Users can catch this trick by first reading the file in a simple text editor like Notepad. DOC files will be nearly unreadable, while RTF files will be readable.
Industry:Software
A resident virus loads into memory and remains inactive until a trigger event. When the event occurs, the virus activates, either infecting a file or disk, or causing other consequences. All boot viruses are resident viruses and so are the most common file viruses.
Industry:Software
A spam filter is a program used to detect unsolicited email to prevent spam from making it to a user's inbox. Filters use heuristics, keyword scans, whitelists and blacklists, and other processes. The filters are placed on email and ISP servers, in anti-spam software, and in anti-phishing browsers. Also see: Bayesian filter, heuristic analysis.
Industry:Software
The timestamp is the time of creation or last modification recorded on a file or another object. Users can usually find the timestamp in the Properties section of a file.
Industry:Software
A Trojan horse is a malicious program that pretends to be a benign application. It purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but they can be just as destructive.
Industry:Software
A variant is a modified version of a virus. It is usually produced on purpose by the virus author or another person amending the virus code. If changes to the original are small, most anti-virus products will also detect variants. However, if the changes are large, the variant may go undetected by anti-virus software.
Industry:Software
A virus is a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission. Some viruses attach to files so when the infected file executes, the virus also executes. Other viruses sit in a computer's memory and infect files as the computer opens, modifies, or creates the files. Some viruses display symptoms, and others damage files and computer systems, but neither is essential in the definition of a virus; a non-damaging virus is still a virus. There are computer viruses written for several operating systems including DOS, Windows, Amiga, Macintosh, Atari, UNIX, and others. McAfee. Com presently detects more than 57,000 viruses, Trojans, and other malicious software. Also see: boot sector infector, file viruses, macro virus, companion virus, worm.
Industry:Software
Warm booting is restarting a computer without first turning off the power. Using CTL+ALT+DEL or the reset button on many computers can warm boot a machine. Also see: cold boot, reset.
Industry:Software
Zugeordnete Laufwerke sind Netzlaufwerke zugeordnet lokalen Laufwerksbuchstaben, die lokal im Internet. Zum Beispiel könnte der Verzeichnispfad MAIN JohnDoe als Laufwerk G abgebildet werden: auf einem Computer.
Industry:Software
Heuristischer Analyse ist verhaltensbasierte Analyse eines Computerprogramms von Antiviren-Software um einen möglichen Virus zu identifizieren. Fehlalarme häufig heuristischen Scan erzeugt werden, wenn ein sauberes Programm verhält sich wie ein Virus.
Industry:Software